Search Results - "Umezawa, Katsuyuki"
-
1
Proposal and evaluation by simulation of management processing load control method for virtual client system
Published in 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (01-10-2014)“…In recent years, virtualization of desktops has become important as a solution for various problems caused from the cost of running a company. Our company…”
Get full text
Conference Proceeding -
2
A Proposal of User Authentication Infrastructure for Next-Generation Telematics
Published in IEEJ transactions on electrical and electronic engineering (01-07-2010)“…To receive a telematics service, it must first be authenticated, and each automobile (or car navigation system) has typically to be linked to a particular…”
Get full text
Journal Article -
3
Evaluation by Questionnaire on Grouped Flipped Classroom Method
Published in 2018 IEEE 10th International Conference on Engineering Education (ICEED) (01-11-2018)“…Flipped classrooms, in which the roles of a classroom lesson and homework are reversed, have recently begun to attract attention. Specifically, the students…”
Get full text
Conference Proceeding -
4
Application and Evaluation of a Grouped Flipped Classroom Method
Published in 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) (01-12-2018)“…We proposed a new flipped classroom method in which students are divided into three groups before each class on the basis of their e-learning self-study logs…”
Get full text
Conference Proceeding -
5
Analysis of Logic Errors Utilizing a Large Amount of File History During Programming Learning
Published in 2020 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) (08-12-2020)“…We proposed an editing record visualization system that can confirm learner modification of programs by storing a learning log. This system was utilized for an…”
Get full text
Conference Proceeding -
6
Development and evaluation of a certificate validation system in mobile environments
Published in IEEJ transactions on electrical and electronic engineering (01-01-2007)“…We have developed a public key certificate validation system considering the restrictions peculiar to the mobile environment, such as processing the speed and…”
Get full text
Journal Article -
7
A Study on the Relationship Between Brain Waves, Heart Rate, and Facial Expressions During Programming Learning
Published in 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (09-10-2022)“…Recently, there have been several on-demand learning systems that are not restricted by learning time or place. However, in these systems, learning content is…”
Get full text
Conference Proceeding -
8
An Effective Flipped Classroom Based on Log Information of Self-Study
Published in 2015 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and Intelligence (01-07-2015)“…Flipped classrooms have recently begun to attract attention. In a flipped classroom, the roles of a classroom and homework are reversed. Specifically, the…”
Get full text
Conference Proceeding -
9
Verification of the effectiveness of classes using intermediate content for transitioning from a visual-to a text-based programming language
Published in 2024 IEEE International Conference on Advanced Learning Technologies (ICALT) (01-07-2024)“…In recent years, visual programming languages (VPLs), such as Scratch, have been widely used by programming beginners. Subsequently, learners often transition…”
Get full text
Conference Proceeding -
10
Comparison of Biometric Information During Learning of Visual- and Text-Based Programming Languages
Published in 2023 8th International STEM Education Conference (iSTEM-Ed) (20-09-2023)“…Novice programmers often start with visual-based programming languages, such as Blockly or Scratch, whereas experts tend to use text-based programming…”
Get full text
Conference Proceeding -
11
Differential Analysis of Heart Rate, Facial Expressions and Brain Wave During Learning of Visual- and Text-Based Languages
Published in 2024 IEEE World Engineering Education Conference (EDUNINE) (10-03-2024)“…From 2020, programming education has become compulsory in elementary schools. Visual-based programming languages are becoming popular as an introduction to…”
Get full text
Conference Proceeding -
12
Utilizing Automatic Speech Recognition for English Pronunciation Practice and Analyzing its Impact
Published in 2023 IEEE 12th International Conference on Engineering Education (ICEED) (29-08-2023)“…The advancement of AI in recent years has been remarkable, along with the widespread use of speech recognition functions. In addition, an increasing number of…”
Get full text
Conference Proceeding -
13
Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis
Published in 2023 IEEE International Conference on Cyber Security and Resilience (CSR) (31-07-2023)“…Cyber attacks are often executed by imitating existing attacks and combining them. Using existing vulnerability databases, we have presented a way to…”
Get full text
Conference Proceeding -
14
Threat analyses using vulnerability databases -Possibility of utilizing past analysis results
Published in 2019 IEEE International Symposium on Technologies for Homeland Security (HST) (01-11-2019)“…We propose a threat analysis method utilizing topic model analysis and vulnerability databases. The method is based on attack tree analysis. We create an…”
Get full text
Conference Proceeding -
15
A Method of Threat Analysis for Cyber-Physical System using Vulnerability Databases
Published in 2018 IEEE International Symposium on Technologies for Homeland Security (HST) (01-10-2018)“…Safety and security are major issues for cyber-physical systems. We propose a threat analysis method effective for the design stage of a safety-critical…”
Get full text
Conference Proceeding -
16
Threat Analysis Using Topic Models in Large-Scale Vulnerability Databases and Security Incident Case Documents
Published in 2021 IEEE International Symposium on Technologies for Homeland Security (HST) (08-11-2021)“…It is crucial to design products bearing security in mind from the initial development stage. Consequently, many threat analysis support tools have been…”
Get full text
Conference Proceeding -
17
Evaluation of Grouped Flipped Classrooms Compared with Three-Year Actual Classes Using a Questionnaire
Published in 2020 IEEE International Symposium on Accreditation of Engineering and Computing Education (ICACIT) (05-11-2020)“…The concept of flipped classroom, in which face-to-face lessons are conducted in school after studying at home, is gaining interest. We proposed the "grouped…”
Get full text
Conference Proceeding -
18
Competitive Compliance with Blockchain
Published in 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (01-03-2019)“…Authentication is essential for sharing information in IoT and its secondary use with AI-capable machines. The aim is to support humans in optimizing risk of…”
Get full text
Conference Proceeding -
19
Research Results on System Development of the Research Project of a Self-Study System for Language Learning
Published in 2022 IEEE World Engineering Education Conference (EDUNINE) (13-03-2022)“…This study proposes to develop a self-study system equipped with an artificial instructor who detects and advises learners and evaluates their language…”
Get full text
Conference Proceeding -
20
An authentication system using smart phones as secure storage
Published in 2011 IEEE International Conference on Systems, Man, and Cybernetics (01-10-2011)“…The smart phone penetration rate has increased recently. There are also many commercial terminals for receiving network services. When a service is received by…”
Get full text
Conference Proceeding